Este contenido no está disponible en el idioma seleccionado.
Work with Builds
Using Builds
Abstract
Chapter 1. Running Builds Copiar enlaceEnlace copiado en el portapapeles!
After installing Builds, you can create a buildah
or source-to-image
build for use. You can also delete custom resources that are not required for a build.
1.1. Creating a buildah build Copiar enlaceEnlace copiado en el portapapeles!
You can create a buildah
build and push the created image to the target registry.
Prerequisites
- You have installed the Builds for Red Hat OpenShift Operator on the OpenShift Container Platform cluster.
-
You have installed the
oc
CLI. -
Optional: You have installed the
shp
CLI.
Procedure
Create a
Build
resource and apply it to the OpenShift Container Platform cluster by using one of the CLIs:Example: Using
oc
CLICopy to Clipboard Copied! Toggle word wrap Toggle overflow - 1
- The location where the source code is placed.
- 2
- The build strategy that you use to build the container.
- 3
- The parameter defined in the build strategy. To set the value of the
dockerfile
strategy parameter, specify the Dockerfile location required to build the output image. - 4
- The location where the built image is pushed. In this procedural example, the built image is pushed to the OpenShift Container Platform cluster internal registry.
buildah-example
is the name of the current project. Ensure that the specified project exists to allow the image push.
Example: Using
shp
CLIshp build create buildah-golang-build \ --source-url="https://github.com/redhat-openshift-builds/samples" --source-context-dir="buildah-build" \ --strategy-name="buildah" \ --dockerfile="Dockerfile" \ --output-image="image-registry.openshift-image-registry.svc:5000/buildah-example/go-app"
$ shp build create buildah-golang-build \ --source-url="https://github.com/redhat-openshift-builds/samples" --source-context-dir="buildah-build" \
1 --strategy-name="buildah" \
2 --dockerfile="Dockerfile" \
3 --output-image="image-registry.openshift-image-registry.svc:5000/buildah-example/go-app"
4 Copy to Clipboard Copied! Toggle word wrap Toggle overflow - 1
- The location where the source code is placed.
- 2
- The build strategy that you use to build the container.
- 3
- The parameter defined in the build strategy. To set the value of the
dockerfile
strategy parameter, specify the Dockerfile location required to build the output image. - 4
- The location where the built image is pushed. In this procedural example, the built image is pushed to the OpenShift Container Platform cluster internal registry.
buildah-example
is the name of the current project. Ensure that the specified project exists to allow the image push.
Check if the
Build
resource is created by using one of the CLIs:Example: Using
oc
CLIoc get builds.shipwright.io buildah-golang-build
$ oc get builds.shipwright.io buildah-golang-build
Copy to Clipboard Copied! Toggle word wrap Toggle overflow Example: Using
shp
CLIshp build list
$ shp build list
Copy to Clipboard Copied! Toggle word wrap Toggle overflow Create a
BuildRun
resource and apply it to the OpenShift Container Platform cluster by using one of the CLIs:Example: Using
oc
CLICopy to Clipboard Copied! Toggle word wrap Toggle overflow - 1
- The
spec.build.name
field denotes the respective build to run, which is expected to be available in the same namespace.
Example: Using
shp
CLIshp build run buildah-golang-build --follow
$ shp build run buildah-golang-build --follow
1 Copy to Clipboard Copied! Toggle word wrap Toggle overflow - 1
- Optional: By using the
--follow
flag, you can view the build logs in the output result.
Check if the
BuildRun
resource is created by running one of the following commands:Example: Using
oc
CLIoc get buildrun buildah-golang-buildrun
$ oc get buildrun buildah-golang-buildrun
Copy to Clipboard Copied! Toggle word wrap Toggle overflow Example: Using
shp
CLIshp buildrun list
$ shp buildrun list
Copy to Clipboard Copied! Toggle word wrap Toggle overflow The
BuildRun
resource creates aTaskRun
resource, which then creates the pods to execute build strategy steps.
Verification
After all the containers complete their tasks, verify the following:
Check whether the pod shows the
STATUS
field asCompleted
:oc get pods -w
$ oc get pods -w
Copy to Clipboard Copied! Toggle word wrap Toggle overflow Example output
NAME READY STATUS RESTARTS AGE buildah-golang-buildrun-dtrg2-pod 2/2 Running 0 4s buildah-golang-buildrun-dtrg2-pod 1/2 NotReady 0 7s buildah-golang-buildrun-dtrg2-pod 0/2 Completed 0 55s
NAME READY STATUS RESTARTS AGE buildah-golang-buildrun-dtrg2-pod 2/2 Running 0 4s buildah-golang-buildrun-dtrg2-pod 1/2 NotReady 0 7s buildah-golang-buildrun-dtrg2-pod 0/2 Completed 0 55s
Copy to Clipboard Copied! Toggle word wrap Toggle overflow Check whether the respective
TaskRun
resource shows theSUCCEEDED
field asTrue
:oc get tr
$ oc get tr
Copy to Clipboard Copied! Toggle word wrap Toggle overflow Example output
NAME SUCCEEDED REASON STARTTIME COMPLETIONTIME buildah-golang-buildrun-dtrg2 True Succeeded 11m 8m51s
NAME SUCCEEDED REASON STARTTIME COMPLETIONTIME buildah-golang-buildrun-dtrg2 True Succeeded 11m 8m51s
Copy to Clipboard Copied! Toggle word wrap Toggle overflow Check whether the respective
BuildRun
resource shows theSUCCEEDED
field asTrue
:oc get br
$ oc get br
Copy to Clipboard Copied! Toggle word wrap Toggle overflow Example output
NAME SUCCEEDED REASON STARTTIME COMPLETIONTIME buildah-golang-buildrun True Succeeded 13m 11m
NAME SUCCEEDED REASON STARTTIME COMPLETIONTIME buildah-golang-buildrun True Succeeded 13m 11m
Copy to Clipboard Copied! Toggle word wrap Toggle overflow During verification, if a build run fails, you can check the
status.failureDetails
field in yourBuildRun
resource to identify the exact point where the failure happened in the pod or container.NoteThe pod might switch to a
NotReady
state because one of the containers has completed its task. This is an expected behavior.
Validate whether the image has been pushed to the registry that is specified in the
build.spec.output.image
field. You can try to pull the image by running the following command from a node that can access the internal registry:podman pull image-registry.openshift-image-registry.svc:5000/<project>/<image>
$ podman pull image-registry.openshift-image-registry.svc:5000/<project>/<image>
1 Copy to Clipboard Copied! Toggle word wrap Toggle overflow - 1
- The project name and image name used when creating the
Build
resource. For example, you can usebuildah-example
as the project name andsample-go-app
as the image name.
1.1.1. Creating buildah build in a network-restricted environment Copiar enlaceEnlace copiado en el portapapeles!
You can create a buildah
build in a network-restricted environment by mirroring the images required by the buildah
build strategy.
Prerequisites
- Your cluster can connect and interact with the git source that you can use to create the buildah build.
Procedure
Run the following command to mirror the images required by the
buildah
build strategy:oc image mirror --insecure -a <registry_authentication> registry.redhat.io/ubi8/buildah@sha256:1c89cc3cab0ac0fc7387c1fe5e63443468219aab6fd531c8dad6d22fd999819e <mirror_registry>/<repo>/ubi8_buildah
$ oc image mirror --insecure -a <registry_authentication> registry.redhat.io/ubi8/buildah@sha256:1c89cc3cab0ac0fc7387c1fe5e63443468219aab6fd531c8dad6d22fd999819e <mirror_registry>/<repo>/ubi8_buildah
Copy to Clipboard Copied! Toggle word wrap Toggle overflow - Perform the steps mentioned in the "Creating a buildah build" section.
1.2. Creating a source-to-image build Copiar enlaceEnlace copiado en el portapapeles!
You can create a source-to-image
build and push the created image to a custom Quay repository.
Prerequisites
- You have installed the Builds for Red Hat OpenShift Operator on the OpenShift Container Platform cluster.
-
You have installed the
oc
CLI. -
Optional: You have installed the
shp
CLI.
Procedure
Create a
Build
resource and apply it to the OpenShift Container Platform cluster by using one of the CLIs:Example: Using
oc
CLICopy to Clipboard Copied! Toggle word wrap Toggle overflow - 1
- The location where the source code is placed.
- 2
- The build strategy that you use to build the container.
- 3
- The parameter defined in the build strategy. To set the value of the
builder-image
strategy parameter, specify the builder image location required to build the output image. - 4
- The location where the built image is pushed. You can push the built image to a custom Quay.io repository. Replace
repo
with a valid Quay.io organization or your Quay user name. - 5
- The secret name that stores the credentials for pushing container images. To generate a secret of the type
docker-registry
for authentication, see "Authentication to container registries".
Example: Using
shp
CLICopy to Clipboard Copied! Toggle word wrap Toggle overflow - 1
- The location where the source code is placed.
- 2
- The build strategy that you use to build the container.
- 3
- The parameter defined in the build strategy. To set the value of the
builder-image
strategy parameter, specify the builder image location required to build the output image. - 4
- The location where the built image is pushed. You can push the built image to a custom Quay.io repository. Replace
repo
with a valid Quay.io organization or your Quay user name. - 5
- The secret name that stores the credentials for pushing container images. To generate a secret of the type
docker-registry
for authentication, see "Authentication to container registries".
Check if the
Build
resource is created by using one of the CLIs:Example: Using
oc
CLIoc get builds.shipwright.io s2i-nodejs-build
$ oc get builds.shipwright.io s2i-nodejs-build
Copy to Clipboard Copied! Toggle word wrap Toggle overflow Example: Using
shp
CLIshp build list
$ shp build list
Copy to Clipboard Copied! Toggle word wrap Toggle overflow Create a
BuildRun
resource and apply it to the OpenShift Container Platform cluster by using one of the CLIs:Example: Using
oc
CLICopy to Clipboard Copied! Toggle word wrap Toggle overflow - 1
- The
spec.build.name
field denotes the respective build to run, which is expected to be available in the same namespace.
Example: Using
shp
CLIshp build run s2i-nodejs-build --follow
$ shp build run s2i-nodejs-build --follow
1 Copy to Clipboard Copied! Toggle word wrap Toggle overflow - 1
- Optional: By using the
--follow
flag, you can view the build logs in the output result.
Check if the
BuildRun
resource is created by running one of the following commands:Example: Using
oc
CLIoc get buildrun s2i-nodejs-buildrun
$ oc get buildrun s2i-nodejs-buildrun
Copy to Clipboard Copied! Toggle word wrap Toggle overflow Example: Using
shp
CLIshp buildrun list
$ shp buildrun list
Copy to Clipboard Copied! Toggle word wrap Toggle overflow The
BuildRun
resource creates aTaskRun
resource, which then creates the pods to execute build strategy steps.
Verification
After all the containers complete their tasks, verify the following:
Check whether the pod shows the
STATUS
field asCompleted
:oc get pods -w
$ oc get pods -w
Copy to Clipboard Copied! Toggle word wrap Toggle overflow Example output
NAME READY STATUS RESTARTS AGE s2i-nodejs-buildrun-phxxm-pod 2/2 Running 0 10s s2i-nodejs-buildrun-phxxm-pod 1/2 NotReady 0 14s s2i-nodejs-buildrun-phxxm-pod 0/2 Completed 0 2m
NAME READY STATUS RESTARTS AGE s2i-nodejs-buildrun-phxxm-pod 2/2 Running 0 10s s2i-nodejs-buildrun-phxxm-pod 1/2 NotReady 0 14s s2i-nodejs-buildrun-phxxm-pod 0/2 Completed 0 2m
Copy to Clipboard Copied! Toggle word wrap Toggle overflow Check whether the respective
TaskRun
resource shows theSUCCEEDED
field asTrue
:oc get tr
$ oc get tr
Copy to Clipboard Copied! Toggle word wrap Toggle overflow Example output
NAME SUCCEEDED REASON STARTTIME COMPLETIONTIME s2i-nodejs-buildrun-phxxm True Succeeded 2m39s 13s
NAME SUCCEEDED REASON STARTTIME COMPLETIONTIME s2i-nodejs-buildrun-phxxm True Succeeded 2m39s 13s
Copy to Clipboard Copied! Toggle word wrap Toggle overflow Check whether the respective
BuildRun
resource shows theSUCCEEDED
field asTrue
:oc get br
$ oc get br
Copy to Clipboard Copied! Toggle word wrap Toggle overflow Example output
NAME SUCCEEDED REASON STARTTIME COMPLETIONTIME s2i-nodejs-buildrun True Succeeded 2m41s 15s
NAME SUCCEEDED REASON STARTTIME COMPLETIONTIME s2i-nodejs-buildrun True Succeeded 2m41s 15s
Copy to Clipboard Copied! Toggle word wrap Toggle overflow During verification, if a build run fails, you can check the
status.failureDetails
field in yourBuildRun
resource to identify the exact point where the failure happened in the pod or container.NoteThe pod might switch to a
NotReady
state because one of the containers has completed its task. This is an expected behavior.
Validate whether the image has been pushed to the registry that is specified in the
build.spec.output.image
field. You can try to pull the image by running the following command after logging in to the registry:podman pull quay.io/<repo>/<image>
$ podman pull quay.io/<repo>/<image>
1 Copy to Clipboard Copied! Toggle word wrap Toggle overflow - 1
- The repository name and image name used when creating the
Build
resource. For example, you can uses2i-nodejs-example
as the image name.
1.2.1. Creating source-to-image build in a network-restricted environment Copiar enlaceEnlace copiado en el portapapeles!
You can create a source-to-image
build in a network-restricted environment by mirroring the images required by the source-to-image
build strategy.
Prerequisites
- Your cluster can connect and interact with the git source that you can use to create the source-to-image build.
-
You have the builder-image required to create the
source-to-image
build in your local registry. If you do not have the builder-image in the local registry, mirror the source image.
Procedure
Run the following command to mirror the images required by the
source-to-image
build strategy:oc image mirror --insecure -a <registry_authentication> registry.redhat.io/source-to-image/source-to-image-rhel8@sha256:d041c1bbe503d152d0759598f79802e257816d674b342670ef61c6f9e6d401c5 <mirror_registry>/<repo>/source-to-image-source-to-image-rhel8
$ oc image mirror --insecure -a <registry_authentication> registry.redhat.io/source-to-image/source-to-image-rhel8@sha256:d041c1bbe503d152d0759598f79802e257816d674b342670ef61c6f9e6d401c5 <mirror_registry>/<repo>/source-to-image-source-to-image-rhel8
Copy to Clipboard Copied! Toggle word wrap Toggle overflow - Perform the steps mentioned in the "Creating a source-to-image build" section.
1.3. Viewing logs Copiar enlaceEnlace copiado en el portapapeles!
You can view the logs of a build run to identify any runtime errors and to resolve them.
Prerequisites
-
You have installed the
oc
CLI. -
Optional: You have installed the
shp
CLI.
Procedure
View logs of a build run by using one of the CLIs:
Using
oc
CLIoc logs <buildrun_resource_name>
$ oc logs <buildrun_resource_name>
Copy to Clipboard Copied! Toggle word wrap Toggle overflow Using
shp
CLIshp buildrun logs <buildrun_resource_name>
$ shp buildrun logs <buildrun_resource_name>
Copy to Clipboard Copied! Toggle word wrap Toggle overflow
1.4. Deleting a resource Copiar enlaceEnlace copiado en el portapapeles!
You can delete a Build
, BuildRun
, or BuildStrategy
resource if it is not required in your project.
Prerequisites
-
You have installed the
oc
CLI. -
Optional: You have installed the
shp
CLI.
Procedure
Delete a
Build
resource by using one of the CLIs:Using
oc
CLIoc delete builds.shipwright.io <build_resource_name>
$ oc delete builds.shipwright.io <build_resource_name>
Copy to Clipboard Copied! Toggle word wrap Toggle overflow Using
shp
CLIshp build delete <build_resource_name>
$ shp build delete <build_resource_name>
Copy to Clipboard Copied! Toggle word wrap Toggle overflow Delete a
BuildRun
resource by using one of the CLIs:Using
oc
CLIoc delete buildrun <buildrun_resource_name>
$ oc delete buildrun <buildrun_resource_name>
Copy to Clipboard Copied! Toggle word wrap Toggle overflow Using
shp
CLIshp buildrun delete <buildrun_resource_name>
$ shp buildrun delete <buildrun_resource_name>
Copy to Clipboard Copied! Toggle word wrap Toggle overflow Delete a
BuildRun
resource used by buildpacks by running the following command:Using
oc
CLIoc delete buildrun <buildpacks_buildrun_resource_name>
$ oc delete buildrun <buildpacks_buildrun_resource_name>
Copy to Clipboard Copied! Toggle word wrap Toggle overflow Using
shp
CLIshp delete buildrun <buildpacks_buildrun_resource_name>
$ shp delete buildrun <buildpacks_buildrun_resource_name>
Copy to Clipboard Copied! Toggle word wrap Toggle overflow Delete a
BuildStrategy
resource by running the following command:Using
oc
CLIoc delete buildstrategies <buildstartegy_resource_name>
$ oc delete buildstrategies <buildstartegy_resource_name>
Copy to Clipboard Copied! Toggle word wrap Toggle overflow
Buildpacks is a Technology Preview feature only. Technology Preview features are not supported with Red Hat production service level agreements (SLAs) and might not be functionally complete. Red Hat does not recommend using them in production. These features provide early access to upcoming product features, enabling customers to test functionality and provide feedback during the development process.
For more information about the support scope of Red Hat Technology Preview features, see Technology Preview Features Support Scope.
1.5. Creating a buildpacks build Copiar enlaceEnlace copiado en el portapapeles!
Learn how to create a buildpacks build and push the created image into the target registry. There are two buildpacks ClusterBuildStrategy
options available for builds for Red Hat OpenShift:
-
buildpacks
strategy -
buildpacks-extender
strategy
The buildpacks-extender
strategy is compatible with the experimental buildpacks extender
lifecycle phase. You can use this strategy, for example, for builds based on Node.js. However, the extender
phase does not support Quarkus, or any other Java-based builds. For such builds, you use the buildpacks
strategy instead.
Buildpacks is a Technology Preview feature only. Technology Preview features are not supported with Red Hat production service level agreements (SLAs) and might not be functionally complete. Red Hat does not recommend using them in production. These features provide early access to upcoming product features, enabling customers to test functionality and provide feedback during the development process.
For more information about the support scope of Red Hat Technology Preview features, see Technology Preview Features Support Scope.
Prerequisites
- You have installed the Builds for Red Hat OpenShift Operator on the OpenShift Container Platform cluster.
-
You have installed the
oc
CLI. -
You have created the project where your final application image is stored by using the command
oc new-project buildpacks-example
. -
Optional: You have installed the
shp
CLI.
Using shp
CLI with buildpacks requires additional permissions setup that you must complete before you start creating a buildpacks build.
Procedure
OPTIONAL: To use the
shp
CLI with buildpacks, you must first grant permission to thepipeline
service account to access the image registry in thebuildpacks-example
project with the following two commands:oc policy add-role-to-user system:image-puller system:serviceaccount:default:pipeline --namespace=buildpacks-example
$ oc policy add-role-to-user system:image-puller system:serviceaccount:default:pipeline --namespace=buildpacks-example
Copy to Clipboard Copied! Toggle word wrap Toggle overflow oc policy add-role-to-user system:image-pusher system:serviceaccount:default:pipeline --namespace=buildpacks-example
$ oc policy add-role-to-user system:image-pusher system:serviceaccount:default:pipeline --namespace=buildpacks-example
Copy to Clipboard Copied! Toggle word wrap Toggle overflow OPTIONAL: Continue with
shp
CLI by switching back to the primary working project:oc project default
$ oc project default
Copy to Clipboard Copied! Toggle word wrap Toggle overflow OPTIONAL: Finish
shp
CLI setup by applying the permission:Copy to Clipboard Copied! Toggle word wrap Toggle overflow Create a
Build
resource and apply it to the OpenShift Container Platform cluster:Using
oc
CLICopy to Clipboard Copied! Toggle word wrap Toggle overflow - 1
- The Git repository containing your application source code.
- 2
- The build strategy to build the container.
- 3
- Parameters set for the buildpacks strategy.
- 4
- The base image on which your application runs.
- 5
- The builder image used by Cloud Native Buildpacks (CNB) to detect and build your application.
- 6
- The subdirectory within your Git repository where the application source code is located.
- 7
- The location where the built image is pushed.
Using
shp
CLI:Copy to Clipboard Copied! Toggle word wrap Toggle overflow
Check if the
Build
resource was created:Using
oc
CLI:oc get builds.shipwright.io buildpack-nodejs-build
$ oc get builds.shipwright.io buildpack-nodejs-build
Copy to Clipboard Copied! Toggle word wrap Toggle overflow Using
shp
CLI:shp build list
$ shp build list
Copy to Clipboard Copied! Toggle word wrap Toggle overflow
Create a
BuildRun
resource and apply it to the OpenShift Container Platform cluster:.. Using
oc
CLI:Copy to Clipboard Copied! Toggle word wrap Toggle overflow - 1
- Reference to the
buildpack-nodejs-build
resource that will be executed.
Using
shp
CLI:…
shp build run buildpack-nodejs-buildrun --follow
$ shp build run buildpack-nodejs-buildrun --follow
+
The shp
CLI version 0.16.0 cannot automatically generate a name for the BuildRun
resource. You must create the name manually:
Create a
BuildRun
resource with a unique nameshp buildrun create buildpack-nodejs-<buildrun_resource_name> --buildref-name buildpack-nodejs-build
$ shp buildrun create buildpack-nodejs-<buildrun_resource_name> --buildref-name buildpack-nodejs-build
1 Copy to Clipboard Copied! Toggle word wrap Toggle overflow - 1
- Flag referencing the build.
Follow the logs:
shp buildrun logs buildpack-nodej-<buildrun_resource_name> --follow
$ shp buildrun logs buildpack-nodej-<buildrun_resource_name> --follow
Copy to Clipboard Copied! Toggle word wrap Toggle overflow
Check if the
BuildRun
resource was created:Using
oc
CLI:oc get buildrun buildpack-nodejs-buildrun
$ oc get buildrun buildpack-nodejs-buildrun
Copy to Clipboard Copied! Toggle word wrap Toggle overflow Using
shp
CLI:shp buildrun list
$ shp buildrun list
Copy to Clipboard Copied! Toggle word wrap Toggle overflow
The BuildRun
resource creates a TaskRun
resource, which then creates the pods to execute build strategy steps.
Verification
- Wait for all containers to complete their tasks.
Check if the pod shows the
STATUS
field asCompleted
:oc get pods -w
$ oc get pods -w
Copy to Clipboard Copied! Toggle word wrap Toggle overflow Check if the
TaskRun
resource shows theSUCCESS
field asTrue
:oc get tr
$ oc get tr
Copy to Clipboard Copied! Toggle word wrap Toggle overflow Check if the
BuildRun
resource shows theSUCCESS
field asTrue
:oc get br
$ oc get br
Copy to Clipboard Copied! Toggle word wrap Toggle overflow NoteIf the build run fails, you can check the
status.failureDetails
field in yourBuildRun
resource to identify the exact point where the failure happened in the pod or container.The pod might switch to a
NotReady
state because one of the containers has completed its task. This is an expected behavior.Check if the image has been pushed to the registry you specified in the
build.spec.output.image
field by running the following command from a node that can access the internal registry to pull the image:podman pull
$ podman pull
Copy to Clipboard Copied! Toggle word wrap Toggle overflow NoteAn example output of the
podman pull
command might look like this:- Example output
image-registry.openshift-image-registry.svc:5000/buildpacks-example/taxi-app
$ image-registry.openshift-image-registry.svc:5000/buildpacks-example/taxi-app
Copy to Clipboard Copied! Toggle word wrap Toggle overflow The project name in this example is
buildpacks-example
, and the image name istaxi-app
.
1.6. Creating a build with OCI artifacts Copiar enlaceEnlace copiado en el portapapeles!
You can create a build using an Open Container Initiative(OCI) artifact as your source code. An OCI artifact, also known as a scratch image, contains only the source code and is not intended to run as a container. You can pull the OCI artifact from a container registry and extract its contents to use as source code to run the build.
Prerequisites
- You have installed the Builds for Red Hat OpenShift Operator on the OpenShift Container Platform cluster.
-
You have installed the
oc
command-line interface (CLI). -
You have installed the
shp
CLI.
Procedure
Create a
Build
resource and apply it to the OpenShift Container Platform cluster. See the following example configuration:Copy to Clipboard Copied! Toggle word wrap Toggle overflow - 1
- Defines the name of the
Build
resource. - 2
- Replace
<quay.io/org/image:tag>
with the location of the OCI artifact source image. - 3
- Replace
<strategy-name>
with the name of the build strategy to build the container (buildah
orsource-to-image
). - 4
- Replace
<target-image-registry/repository/image:tag>
with the location where you want to push the built image. - 5
- Optional: Replace
<secret-name-for-credentials>
with the secret name that stores the credentials for pushing container images. To generate a secret for a private registry for authentication, see Authentication to container registries
Choose one of the following methods to upload your source code to the required registry and run the build:
- Use the shp CLI
- Manually upload the OCI artifact
1.6.1. Uploading the OCI artifact by using the CLI Copiar enlaceEnlace copiado en el portapapeles!
You can upload your source code to the required registry by using the CLI.
Run the following command in the directory containing the local source code. It packages your source code into a scratch container image, pushes it to the required registry and runs the build:
shp build upload my-oci-build
$ shp build upload my-oci-build
1 Copy to Clipboard Copied! Toggle word wrap Toggle overflow - 1
- Defines the name of the
Build
resource.
1.6.2. Uploading the OCI artifact manually Copiar enlaceEnlace copiado en el portapapeles!
You can upload your source code manually to the required registry and run the build.
Create a
Containerfile
in the root directory of your source code and add the following content:FROM scratch COPY . /
FROM scratch COPY . /
Copy to Clipboard Copied! Toggle word wrap Toggle overflow Run the following command in the root directory of your source code to build the container image using Podman:
podman build -t <registry-path>/<image-name>:<tag>
$ podman build -t <registry-path>/<image-name>:<tag>
1 Copy to Clipboard Copied! Toggle word wrap Toggle overflow - 1
- Replace <registry-path>/<image-name>:<tag> with the build location for the container image.
Push the container image to the required location using the following command:
podman push <registry-path>/<image-name>:<tag>
$ podman push <registry-path>/<image-name>:<tag>
1 Copy to Clipboard Copied! Toggle word wrap Toggle overflow - 1
- Replace <registry-path>/<image-name>:<tag> with the location where you want to push the built image.
Run the build using the following command:
shp build run my-oci-build
$ shp build run my-oci-build
1 Copy to Clipboard Copied! Toggle word wrap Toggle overflow - 1
- Defines the name of the
Build
resource.
Legal Notice
Copiar enlaceEnlace copiado en el portapapeles!
Copyright © 2025 Red Hat
OpenShift documentation is licensed under the Apache License 2.0 (https://www.apache.org/licenses/LICENSE-2.0).
Modified versions must remove all Red Hat trademarks.
Portions adapted from https://github.com/kubernetes-incubator/service-catalog/ with modifications by Red Hat.
Red Hat, Red Hat Enterprise Linux, the Red Hat logo, the Shadowman logo, JBoss, OpenShift, Fedora, the Infinity logo, and RHCE are trademarks of Red Hat, Inc., registered in the United States and other countries.
Linux® is the registered trademark of Linus Torvalds in the United States and other countries.
Java® is a registered trademark of Oracle and/or its affiliates.
XFS® is a trademark of Silicon Graphics International Corp. or its subsidiaries in the United States and/or other countries.
MySQL® is a registered trademark of MySQL AB in the United States, the European Union and other countries.
Node.js® is an official trademark of Joyent. Red Hat Software Collections is not formally related to or endorsed by the official Joyent Node.js open source or commercial project.
The OpenStack® Word Mark and OpenStack logo are either registered trademarks/service marks or trademarks/service marks of the OpenStack Foundation, in the United States and other countries and are used with the OpenStack Foundation’s permission. We are not affiliated with, endorsed or sponsored by the OpenStack Foundation, or the OpenStack community.
All other trademarks are the property of their respective owners.